Skip to main content
European Commission logo print header

A COmprehensive cyber-intelligence framework for resilient coLLABorative manufacturing Systems

Deliverables

Publications

A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures

Author(s): Eva Papadogiannaki, Sotiris Ioannidis
Published in: ACM Computing Surveys, Issue 54/6, 2022, ISSN 1557-7341
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3457904

On Architectural Support for Instruction Set Randomization

Author(s): George Christou, Giorgos Vasiliadis, Vassilis Papaefstathiou, Antonis Papadogiannakis, Sotiris Ioannidis
Published in: ACM Transactions on Architecture and Code Optimization, Issue 17/4, 2020, Page(s) 1-26, ISSN 1544-3566
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3419841

A Hessian inversion-free exact second order method for distributed consensus optimization

Author(s): Dušan Jakovetić, Nataša Krejić and Nataša Krklec Jerinkić
Published in: IEEE Transactions on Signal and Information Processing over Networks, Issue 8, 2022, ISSN 2373-776X
Publisher: IEEE
DOI: 10.1109/tsipn.2022.3203860

LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks

Author(s): Pallavi Kaliyar, Wafa Ben Jaballah, Mauro Conti, Chhagan Lal
Published in: Computers & Security, Issue 94, 2020, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2020.101849

Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey

Author(s): Pls Jayalaxmi, Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim
Published in: IEEE Access, Issue 10, 2022, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2022.3220622

A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures

Author(s): Fabio Federici; Davide Martintoni; Valerio Senni
Published in: Volume 12, Issue 5, 2022, ISSN 0000-0000
Publisher: MDPI
DOI: 10.3390/electronics12030566

RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation

Author(s): Ernesto Gómez-Marín; Luis Parrilla; Gianfranco Mauro; Antonio Escobar-Molero; Diego P. Morales; Encarnación Castillo
Published in: Sensors, Issue 7, 2022, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s22135060

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

Author(s): Ashish Kumar, Rahul Saha, Mauro Conti, Gulshan Kumar, William J Buchanan, Tai Hoon Kim
Published in: Journal of Network and Computer Applications, Issue 204, 2022, ISSN 1084-8045
Publisher: Academic Press
DOI: 10.1016/j.jnca.2022.103414

Distributed Recursive Estimation Under Heavy-Tail Communication Noise

Author(s): D. Jakovetic, M. Vukovic, D. Bajovic, A. K. Sahu, S. Kar
Published in: SIAM Journal on Control and Optimization, 2022, ISSN 0363-0129
Publisher: Society for Industrial and Applied Mathematics

Adaptive Intrusion Detection in Edge Computing using Cerebellar Model Articulation Controller and Spline Fit

Author(s): Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tannishtha Devgun and JPC Rodrigues
Published in: IEEE Transactions on Services Computing, Issue Early Access, 2022, ISSN 0000-0000
Publisher: IEEE
DOI: 10.1109/tsc.2022.3178471

EFIX: Exact fixed point methods for distributed optimization

Author(s): Dušan Jakovetić, Nataša Krejić and Nataša Krklec Jerinkić
Published in: Journal of Global Optimization, 2022, Page(s) 1-25, ISSN 1573-2916
Publisher: Springer
DOI: 10.1007/s10898-022-01221-4

Distributed nonlinear state estimation in electric power systems using graph neural networks

Author(s): Ognjen Kundacina, Mirsad Cosovic, Dragisa Miskovic and Dejan Vukobratovic.
Published in: IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), 2022, 2022, Page(s) 8-13
Publisher: IEEE
DOI: 10.1109/smartgridcomm52983.2022.9960967

The Million Dollar Handshake Secure and Attested Communications in the Cloud

Author(s): Nikolaos Chalkiadakis, Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Published in: Conference: IEEE CLOUD 2020, 2020
Publisher: TBD

Andromeda: Enabling Secure Enclaves For The Android Ecosystem

Author(s): Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, and Sotiris Ioannidis.
Published in: 24th Information Security Conference (ISC)., Issue LNSC, volume 13118, 2021
Publisher: Spinger
DOI: 10.1007/978-3-030-91356-4_11

Machine learning methods for device identification using wireless fingerprinting.

Author(s): Srđan Šobot, Vukan Ninković, Dejan Vukobratović, Milan Pavlović and Miloš Radovanović
Published in: 5th International Balkan Conference on Communications and Networking (BalkanCom), Sarajevo, Bosnia and Herzegovina, 2022, Page(s) 83-188
Publisher: IEEE
DOI: 10.1109/balkancom55633.2022.9900723

PoSC: Combined Score for Consensus in Intemet-of-Things Applications

Author(s): Arshdeep Singh, Rahul Saha, Mauro Conti, Gulshan Kumar
Published in: Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022
Publisher: IEEE
DOI: 10.1109/bcca55292.2022.9922056

On Matrix Multiplication with Homomorphic Encryption

Author(s): Panagiotis Rizomiliotis; Aikaterini Triakosia
Published in: In Proceedings of the 2022 on Cloud Computing Security Workshop (CCSW'22), Issue 7, 2022, ISBN 9781450398756
Publisher: ACM
DOI: 10.1145/3560810.3564267

Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing Infrastructures

Author(s): Loris Dal Lago, Fabio Federici, Davide Martintoni, Valerio Senni
Published in: SECRYPT 2022, 2022, Page(s) 499-506
Publisher: ScitePress
DOI: 10.5220/0011144700003283

An enclave assisted snapshot-based kernel integrity monitor

Author(s): Dimitris Deyannis, Dimitris Karnikis, Giorgos Vasiliadis, Sotiris Ioannidis
Published in: Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking, 2020, Page(s) 19-24, ISBN 9781450371322
Publisher: ACM
DOI: 10.1145/3378679.3394539

Towards achieving confidentiality in Hyperledger Fabric

Author(s): Benedikt Hofmann, Prabhakaran Kasinathan, Martin Wimmer
Published in: IEEE International Conference on Blockchain (Blockchain), 2022
Publisher: IEEE
DOI: 10.1109/blockchain55522.2022.00060

Secure Remote Maintenance via Workflow-Driven Security Framework

Author(s): Kasinathan, Prabhakaran, Davide Martinoni, Benedikt Hofmann, Valerio Senni, Martin Wimmer
Published in: Conference: IEEE Blockchain 2021, 2021
Publisher: IEEE
DOI: 10.1109/blockchain53845.2021.00016

Employing a consensus nonlinearity in distributed estimation under heavy-tail noise

Author(s): Manojlo Vukovic, Dusan Jakovetic, Dragana Bajovic, Anit Kumar Sahu, Soummya Kar
Published in: 32nd EURO 2022 Conference, 2022
Publisher: In selected journals by the conference

SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning

Author(s): Mohamad Mansouri, Melek Onen, Wafa Ben Jaballah, Mauro Conti
Published in: Privacy Enhancing Technologies Symposium (PETS), 2023, Page(s) 140–157
Publisher: N/A
DOI: 10.56553/popets-2023-0009

Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning

Author(s): Mohamad Mansouri, Melek Onen, Wafa Ben Jaballah
Published in: Annual Computer Security Applications Conference (ACSAC 2022), 2022, Page(s) 146-158
Publisher: N/A
DOI: 10.1145/3564625.3568135

Network Intrusion Detection in Encrypted Traffic

Author(s): Eva Papadogiannaki, Giorgos Tsirantonakis, Sotiris Ioannidis
Published in: The Fourth International Workshop on Secure Smart Societies in Next Generation Networks (IEEE DSC 2022), 2022
Publisher: IEEE
DOI: 10.1109/dsc54232.2022.9888942

, Edge Machine Learning in 3GPP NB-IoT: Architecture, Applications and Demonstration

Author(s): D. Vukobratovic, M. Lukic, I. Mezei, D. Bajovic, D. Danilovic, M. Savic, Z. Bodroski, S. Skrbic, D. Jakovetic
Published in: European Signal Processing Conference, EUSIPCO 2022, 2022, Page(s) 707-711
Publisher: IEEE
DOI: 10.23919/eusipco55093.2022.9909793

Sensitive information protection in blockchain-based supply-chain management for aerospace

Author(s): Davide Martintoni, Valerio Senni, Ernesto Gomez Marin, Javier Cabrera Gutierrez
Published in: IEEE International Conference on Omni-layer Intelligent Systems (COINS), 2022, 2022
Publisher: IEEE
DOI: 10.1109/coins54846.2022.9854974

Homomorphic Encryption in Manufacturing Compliance Checks

Author(s): Aikaterini Triakosia, Panagiotis Rizomiliotis, Konstantinos Tserpes, Cecilia Tonelli, Valerio Senni, Fabio Federici
Published in: Trust, Privacy and Security in Digital Business - 19th International Conference, TrustBus 2022, Issue LNCS, volume 13582, 2022
Publisher: Springer
DOI: 10.1007/978-3-031-17926-6_6

Gradient Based Clustering

Author(s): Aleksandar Armacki; Dragana Bajovic; Dusan Jakovetic; Soummya Kar
Published in: The Thirty-ninth International Conference on Machine Learning, Issue 10, 2022, ISSN 2640-3498
Publisher: Proceedings of Machine Learning Research
DOI: 10.5281/zenodo.7007266

Peek-a-boo - i see your smart home activities, even encrypted!

Author(s): Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac
Published in: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020, Page(s) 207-218, ISBN 9781450380065
Publisher: ACM
DOI: 10.1145/3395351.3399421

Partially Oblivious Neural Network Inference

Author(s): P. Rizomiliotis, C. Diou, A. Triakosia, E. Kyranas, K. Tserpes
Published in: 19th International Conference on Security and Cryptography SECRYPT 2022, 2022, Page(s) 158-169
Publisher: ScitePress
DOI: 10.5220/0011272500003283

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available